US7373655B1 - System for securing inbound and outbound data packet flow in a computer network - Google Patents
System for securing inbound and outbound data packet flow in a computer network Download PDFInfo
- Publication number
- US7373655B1 US7373655B1 US09/314,330 US31433099A US7373655B1 US 7373655 B1 US7373655 B1 US 7373655B1 US 31433099 A US31433099 A US 31433099A US 7373655 B1 US7373655 B1 US 7373655B1
- Authority
- US
- United States
- Prior art keywords
- authorized
- access
- network element
- network
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/41—User authentication where a single sign-on provides access to a plurality of computers
Definitions
- the present invention is directed to a method and apparatus for providing authorization to access network resources. More specifically, the present invention is directed to a method and apparatus for providing an improved authorization process for accessing network resources.
- FIG. 1 shows, in a schematic way, a network orientation in which a user 10 may attempt to get information from servers 15 and 20 via a wide area network (WAN) 50 .
- WAN wide area network
- the user via a terminal device such as a PC 60 , can connect to a gateway into the wide area network, here shown as Internet 30 service provider (ISP) 40 .
- ISP Internet 30 service provider
- the user's terminal facility is connected to the ISP via a standard telephone network 30 such as the Public Switched Telephone Network (PSTN).
- PSTN Public Switched Telephone Network
- PSTN Public Switched Telephone Network
- PSTN Public Switched Telephone Network
- either one of the servers, or both may desire to either charge for access to the information on the server or limit the access to information on the server based on some predetermined criteria.
- the server 1 , 15 may provide an on-line version of a particular publication.
- the producer of the publication may desire to limit access to the publication to only those users willing to pay a subscription fee for the publication.
- the server decides to limit access to its resources, it must provide some facility by which it can authorize and/or authenticate a user who wishes to access a given resource.
- each server that wishes to limit access to its resources must also provide a separate authentication/authorization facility. This is represented in each of the servers illustrated in FIG. 1 . This arrangement creates a tremendous burden for those who wish to limit access to the resources. As the number of subscribers grows, the authentication and authorization facility resource for each server must be adapted to this growth. It also requires each individual who wishes to limit access to somehow incorporate additionally complex application software at additional cost to limit the access in the manner desired.
- a centralized server includes an authorization database.
- each location interacting with GetAccess requires its own server to load a GetAccess interface and to communicate with the central facility in such a manner as to build its own authorization table with the aid of the centralized facility. While this off-loads some of the responsibility for some of the authorization, it still requires complex interactions between the end servers and the centralized authority as well as the loading of authorization information at individual servers that are seeking to limit access to their resources.
- the present invention provides a method for controlling access to network resources by allowing prospective users to assume the identities of pre-authorized machines.
- a user seeking access to a particular network resource connects to a stateful virtual identity machine (SVIM).
- SVIM stateful virtual identity machine
- the machine is capable of authorizing the end user.
- the machine having authorized an end user, shares its identity with the end user.
- the authorized user assumes the identity of the machine and appears to the network as if it were that machine. Since the network resource in question has pre-authorized a machine, this pre-authorization extends to each end user that assumes the virtual identity of the machine.
- the authorization process at the stateful virtual identity machine can be as simple as considering an end user authorized simply by virtue of the fact that they have physically accessed the SVIM, as would be the case in a place where the SVIM is maintained in a secure location and physical access is limited to only permitted users.
- the SVIM could include a table or tables and receive a key or keys of some number of bits in length from the end user device. The received key would be checked against the logical table and the end user would assume the identity of the machine if the received key or virtual identity character (VIC) matches any content in the logical table in the SVIM.
- VIP virtual identity character
- FIG. 1 illustrates a schematic view of a prior art communication system.
- FIG. 2 illustrates a schematic view of a system in which an embodiment of the present invention may be incorporated.
- FIG. 3 illustrates in block diagram form an element from the system of FIG. 2 .
- the present invention is based on a different philosophy for managing access to resources.
- each individual server would maintain its own authorization capabilities
- the present inventor entitled “Method and Apparatus for Providing Centralized URL Authorization,” based on Ser. No. 60/113,493, filed on Dec. 22, 1998, in which a centralized authentication facility is provided
- the present invention is directed to a system in which authorization is provided by some intermediate mechanism.
- the present invention provides an element referred to as a stateful virtual identity machine (SVIM) which is pre-authorized to access network resources.
- SVIM stateful virtual identity machine
- An end user desiring to access the very same network resources can connect itself to the SVIM, and, if the connection is allowed, the end user assumes the identity of the SVIM such that the connected end user has all of the access privileges assigned to the SVIM.
- FIG. 2 An example of a system in which the present invention may be deployed is illustrated in FIG. 2 .
- This figure illustrates two servers, server A, 200 and server B, 210 . Both of the servers are connected to a wide area network (WAN) 250 .
- a network node a stateful virtual identity machine (SVIM) 240 , is also connected to the wide area network.
- SVIM stateful virtual identity machine
- the SVIM has a plurality of logical ports, here illustrated as ports 261 to 264 .
- a work station 270 utilized by an end user, can be connected to one of the logical ports of the SVIM.
- the SVIM is pre-authorized to have access to certain network resources. For example, perhaps the SVIM is associated with the service provider at server A. That SVIM then may have access privileges to some or all of the resources of server A.
- the SVIM analyzes whether any of the devices which attempt to connect to one of its logical ports should be allowed to do so. This can be done by checking a virtual identity characteristic (VIC) provided by the work station, for example, to the SVIM.
- VOC virtual identity characteristic
- the VIC can be a key or work station identifier that is inserted in the layer-two headers of data transmission between the end user and the SVIM.
- VICs would be inserted either by the manufacturer of the end user machine, for example the work station or other devices such as a PC or cellular telephone, or could be inserted by software programs which are designed to synchronize end user VICs with VICs contained in the SVIM. If the SVIM in response to the VIC determines that the end user machine, here workstation 270 , is allowed to connect to the SVIM, then the end user assumes the virtual identity of the SVIM. Security profiles contained on security databases permit only those entities having the identity of the SVIM to access the resource.
- the SVIM can act as something of a concentrator of end user requests out in the network and can select those end users which will be permitted to assume the virtual identity of a machine that is pre-authorized to have access to particular network resources.
- This configuration significantly reduces the load on security operations at the server itself and localizes security out in the network nearer to the end users seeking access to the network resources.
- the SVIM are considered “stateful” in that in the configuration described with respect to FIG. 2 , the SVIM can remember whether a particular end user is connected to the SVIM or not. It keeps track of the “state” of the connection between any given end user and the SVIM.
- the device includes a processor, CPU 320 , operating under control of programs stored in memory, such as VIC database 330 .
- That same database can contain authorization information for implementing whether an end user can assure the virtual identity of the SVIM.
- the database can maintain authorization information in tabular form for example, such as in an access table that identifies whether a given user is authorized to assure the machine's identity. The table could correlate user identifications with various resources, also having identifiers, accessible via the machine.
- Port 310 can be coupled to WAN as shown in FIG. 2 while ports 311 to 314 can correspond to ports 261 to 264 in FIG. 2 .
- the ports, CPU and database can be coupled in an internal network configuration using a data bus 340 .
- Authorization of a given end user to assume the virtual identity of the SVIM may come from a more implicit activity than the exchange of keys or VIC information. More specifically, it is possible that a particular SVIM may be positioned in a secure location such that only end users who have access to the secured location will be able to avail themselves of the use of the SVIM. In such a circumstance, it is the physical access to the SVIM which creates the presumption that the end user is an authorized user from the perspective of the SVIM. Even in this circumstance, though, the end user, assumes the virtual identity of the SVIM for all purposes.
- the network resources do not worry about the true identity of the end user. Instead, all that is of significance to the network resource's security capabilities is that the end user has assumed the identity of the SVIM to which it is logically or physically connected.
- security capabilities localized with a server providing network resources can be modestly maintained by simply keeping track of the virtual identity machines which reside in the network and are pre-authorized to access network resources.
- the SVIM then assume the responsibility, out in the connection points of the network, of identifying appropriate end users. If it is desirable to provide access for more users the additional SVIMs could be provided, the memory or logic tables of the SVIMs could be expanded or both.
- This invention could have applicability not only in the context of services providing, for example, web site or web page information, but in connection with other services which might be accessed via data networks. It is applicable in any environment in which an end user can be logically connected to a machine pre-authorized to have access to network resources and assume virtual identity of that machine.
Abstract
Description
Claims (9)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/314,330 US7373655B1 (en) | 1998-12-22 | 1999-05-19 | System for securing inbound and outbound data packet flow in a computer network |
US12/149,991 US7934090B2 (en) | 1998-12-22 | 2008-05-12 | System for securing inbound and outbound data packet flow in a computer network |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11349598P | 1998-12-22 | 1998-12-22 | |
US09/314,330 US7373655B1 (en) | 1998-12-22 | 1999-05-19 | System for securing inbound and outbound data packet flow in a computer network |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/149,991 Continuation US7934090B2 (en) | 1998-12-22 | 2008-05-12 | System for securing inbound and outbound data packet flow in a computer network |
Publications (1)
Publication Number | Publication Date |
---|---|
US7373655B1 true US7373655B1 (en) | 2008-05-13 |
Family
ID=39361754
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/314,330 Expired - Fee Related US7373655B1 (en) | 1998-12-22 | 1999-05-19 | System for securing inbound and outbound data packet flow in a computer network |
US12/149,991 Expired - Fee Related US7934090B2 (en) | 1998-12-22 | 2008-05-12 | System for securing inbound and outbound data packet flow in a computer network |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/149,991 Expired - Fee Related US7934090B2 (en) | 1998-12-22 | 2008-05-12 | System for securing inbound and outbound data packet flow in a computer network |
Country Status (1)
Country | Link |
---|---|
US (2) | US7373655B1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7895642B1 (en) * | 2007-05-22 | 2011-02-22 | Sprint Communications Company L.P. | Tiered security services |
US20120030737A1 (en) * | 1998-12-08 | 2012-02-02 | Nomadix, Inc. | System and method for authorizing a portable communication device |
US8725888B2 (en) | 1998-12-08 | 2014-05-13 | Nomadix, Inc. | Systems and methods for providing content and services on a network system |
US10021111B2 (en) * | 2013-11-07 | 2018-07-10 | International Business Machines Corporation | Location based authentication of users to a virtual machine in a computer system |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1408704A1 (en) * | 2002-10-09 | 2004-04-14 | Nokia Corporation | Method and arrangement for concealing true identity of user in communications system |
US9730006B1 (en) * | 2016-04-15 | 2017-08-08 | Qualcomm Incorporated | Enhanced system acquisition for wearables |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4969092A (en) * | 1988-09-30 | 1990-11-06 | Ibm Corp. | Method for scheduling execution of distributed application programs at preset times in an SNA LU 6.2 network environment |
US4991089A (en) * | 1988-09-30 | 1991-02-05 | Ibm Corp. | Method for establishing current terminal addresses for system users processing distributed application programs in an SNA LU 6.2 network environment |
US5001628A (en) * | 1987-02-13 | 1991-03-19 | International Business Machines Corporation | Single system image uniquely defining an environment for each user in a data processing system |
US5063500A (en) * | 1988-09-29 | 1991-11-05 | Ibm Corp. | System for executing segments of application program concurrently/serially on different/same virtual machine |
US5321841A (en) * | 1989-06-29 | 1994-06-14 | Digital Equipment Corporation | System for determining the rights of object access for a server process by combining them with the rights of the client process |
US5689708A (en) * | 1995-03-31 | 1997-11-18 | Showcase Corporation | Client/server computer systems having control of client-based application programs, and application-program control means therefor |
US6000033A (en) * | 1997-11-26 | 1999-12-07 | International Business Machines Corporation | Password control via the web |
US6055575A (en) * | 1997-01-28 | 2000-04-25 | Ascend Communications, Inc. | Virtual private network system and method |
US6058426A (en) * | 1997-07-14 | 2000-05-02 | International Business Machines Corporation | System and method for automatically managing computing resources in a distributed computing environment |
US6275953B1 (en) * | 1997-09-26 | 2001-08-14 | Emc Corporation | Recovery from failure of a data processor in a network server |
US20010042135A1 (en) * | 1998-06-08 | 2001-11-15 | Daniel E. Lewis | Method and apparatus for integrating devices into an enterprise computer network |
US6367009B1 (en) * | 1998-12-17 | 2002-04-02 | International Business Machines Corporation | Extending SSL to a multi-tier environment using delegation of authentication and authority |
US6496847B1 (en) * | 1998-05-15 | 2002-12-17 | Vmware, Inc. | System and method for virtualizing computer systems |
US6633977B1 (en) * | 2000-03-31 | 2003-10-14 | International Business Machines Corporation | System and method for computer system duplication |
US6795967B1 (en) * | 1999-01-26 | 2004-09-21 | Microsoft Corporation | Changing user identities without closing applications |
US6917279B1 (en) * | 1998-10-16 | 2005-07-12 | Remote Mobile Security Access Limited | Remote access and security system |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5201049A (en) * | 1988-09-29 | 1993-04-06 | International Business Machines Corporation | System for executing applications program concurrently/serially on different virtual machines |
US5802590A (en) * | 1994-12-13 | 1998-09-01 | Microsoft Corporation | Method and system for providing secure access to computer resources |
US5918019A (en) * | 1996-07-29 | 1999-06-29 | Cisco Technology, Inc. | Virtual dial-up protocol for network communication |
US5917997A (en) * | 1996-12-06 | 1999-06-29 | International Business Machines Corporation | Host identity takeover using virtual internet protocol (IP) addressing |
US5881225A (en) * | 1997-04-14 | 1999-03-09 | Araxsys, Inc. | Security monitor for controlling functional access to a computer system |
US6560461B1 (en) * | 1997-08-04 | 2003-05-06 | Mundi Fomukong | Authorized location reporting paging system |
US5974566A (en) * | 1997-10-07 | 1999-10-26 | International Business Machines Corporation | Method and apparatus for providing persistent fault-tolerant proxy login to a web-based distributed file service |
US6009103A (en) * | 1997-12-23 | 1999-12-28 | Mediaone Group, Inc. | Method and system for automatic allocation of resources in a network |
US6088805A (en) * | 1998-02-13 | 2000-07-11 | International Business Machines Corporation | Systems, methods and computer program products for authenticating client requests with client certificate information |
US6490624B1 (en) * | 1998-07-10 | 2002-12-03 | Entrust, Inc. | Session management in a stateless network system |
US6748420B1 (en) * | 1999-11-23 | 2004-06-08 | Cisco Technology, Inc. | Methods and apparatus for providing shared access to an application |
-
1999
- 1999-05-19 US US09/314,330 patent/US7373655B1/en not_active Expired - Fee Related
-
2008
- 2008-05-12 US US12/149,991 patent/US7934090B2/en not_active Expired - Fee Related
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5001628A (en) * | 1987-02-13 | 1991-03-19 | International Business Machines Corporation | Single system image uniquely defining an environment for each user in a data processing system |
US5063500A (en) * | 1988-09-29 | 1991-11-05 | Ibm Corp. | System for executing segments of application program concurrently/serially on different/same virtual machine |
US4991089A (en) * | 1988-09-30 | 1991-02-05 | Ibm Corp. | Method for establishing current terminal addresses for system users processing distributed application programs in an SNA LU 6.2 network environment |
US4969092A (en) * | 1988-09-30 | 1990-11-06 | Ibm Corp. | Method for scheduling execution of distributed application programs at preset times in an SNA LU 6.2 network environment |
US5321841A (en) * | 1989-06-29 | 1994-06-14 | Digital Equipment Corporation | System for determining the rights of object access for a server process by combining them with the rights of the client process |
US5689708A (en) * | 1995-03-31 | 1997-11-18 | Showcase Corporation | Client/server computer systems having control of client-based application programs, and application-program control means therefor |
US6055575A (en) * | 1997-01-28 | 2000-04-25 | Ascend Communications, Inc. | Virtual private network system and method |
US6058426A (en) * | 1997-07-14 | 2000-05-02 | International Business Machines Corporation | System and method for automatically managing computing resources in a distributed computing environment |
US6275953B1 (en) * | 1997-09-26 | 2001-08-14 | Emc Corporation | Recovery from failure of a data processor in a network server |
US6000033A (en) * | 1997-11-26 | 1999-12-07 | International Business Machines Corporation | Password control via the web |
US6496847B1 (en) * | 1998-05-15 | 2002-12-17 | Vmware, Inc. | System and method for virtualizing computer systems |
US20010042135A1 (en) * | 1998-06-08 | 2001-11-15 | Daniel E. Lewis | Method and apparatus for integrating devices into an enterprise computer network |
US6917279B1 (en) * | 1998-10-16 | 2005-07-12 | Remote Mobile Security Access Limited | Remote access and security system |
US6367009B1 (en) * | 1998-12-17 | 2002-04-02 | International Business Machines Corporation | Extending SSL to a multi-tier environment using delegation of authentication and authority |
US6795967B1 (en) * | 1999-01-26 | 2004-09-21 | Microsoft Corporation | Changing user identities without closing applications |
US6633977B1 (en) * | 2000-03-31 | 2003-10-14 | International Business Machines Corporation | System and method for computer system duplication |
Non-Patent Citations (1)
Title |
---|
Dix, Jan. 22, 1996, Network World, p. 17. * |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120030737A1 (en) * | 1998-12-08 | 2012-02-02 | Nomadix, Inc. | System and method for authorizing a portable communication device |
US8613053B2 (en) * | 1998-12-08 | 2013-12-17 | Nomadix, Inc. | System and method for authorizing a portable communication device |
US8713641B1 (en) | 1998-12-08 | 2014-04-29 | Nomadix, Inc. | Systems and methods for authorizing, authenticating and accounting users having transparent computer access to a network using a gateway device |
US8725888B2 (en) | 1998-12-08 | 2014-05-13 | Nomadix, Inc. | Systems and methods for providing content and services on a network system |
US8725899B2 (en) | 1998-12-08 | 2014-05-13 | Nomadix, Inc. | Systems and methods for providing content and services on a network system |
US8788690B2 (en) | 1998-12-08 | 2014-07-22 | Nomadix, Inc. | Systems and methods for providing content and services on a network system |
US9160672B2 (en) | 1998-12-08 | 2015-10-13 | Nomadix, Inc. | Systems and methods for controlling user perceived connection speed |
US9548935B2 (en) | 1998-12-08 | 2017-01-17 | Nomadix, Inc. | Systems and methods for providing content and services on a network system |
US10110436B2 (en) | 1998-12-08 | 2018-10-23 | Nomadix, Inc. | Systems and methods for providing content and services on a network system |
US10341243B2 (en) | 1998-12-08 | 2019-07-02 | Nomadix, Inc. | Systems and methods for providing content and services on a network system |
US7895642B1 (en) * | 2007-05-22 | 2011-02-22 | Sprint Communications Company L.P. | Tiered security services |
US10021111B2 (en) * | 2013-11-07 | 2018-07-10 | International Business Machines Corporation | Location based authentication of users to a virtual machine in a computer system |
Also Published As
Publication number | Publication date |
---|---|
US20080263639A1 (en) | 2008-10-23 |
US7934090B2 (en) | 2011-04-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7082532B1 (en) | Method and system for providing distributed web server authentication | |
US6219790B1 (en) | Centralized authentication, authorization and accounting server with support for multiple transport protocols and multiple client types | |
US9038145B2 (en) | Method and system for restricting access to user resources | |
US10070165B2 (en) | System and method for managing entitlements to data over a network | |
US7356833B2 (en) | Systems and methods for authenticating a user to a web server | |
US7243369B2 (en) | Uniform resource locator access management and control system and method | |
EP1654852B1 (en) | System and method for authenticating clients in a client-server environment | |
US6678733B1 (en) | Method and system for authorizing and authenticating users | |
US6601092B2 (en) | Information processing apparatus, information processing method, and transmitting medium | |
US5682478A (en) | Method and apparatus for supporting multiple, simultaneous services over multiple, simultaneous connections between a client and network server | |
US7353282B2 (en) | Methods and systems for sharing a network resource with a user without current access | |
US8966584B2 (en) | Dynamic authentication gateway | |
US20030200465A1 (en) | Web based applications single sign on system and method | |
US20130081126A1 (en) | System and method for transparent single sign-on | |
US20050086346A1 (en) | Access point coupling guests to the internet | |
US7934090B2 (en) | System for securing inbound and outbound data packet flow in a computer network | |
US20040064550A1 (en) | Data processing system | |
EP1244998A1 (en) | Method and apparatus for providing secure authentication of portable devices through internet host servers | |
AU2001280975A1 (en) | Systems and methods for authenticating a user to a web server | |
JP2005519365A (en) | Method and apparatus for handling user identifier in single sign-on service | |
WO2005114946A1 (en) | An apparatus, computer-readable memory and method for authenticating and authorizing a service request sent from a service client to a service provider | |
WO2001033340A2 (en) | Method and system for restricting access to user resources | |
JP2004524591A (en) | Systems, methods, and computer program products for providing integrated authentication services for online applications | |
KR20050055852A (en) | Service control system and method using sub-identifier |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: AT&T WIRELESS SERVICES, INC., WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MARIA, ARTURO;REEL/FRAME:009976/0901 Effective date: 19990518 |
|
AS | Assignment |
Owner name: CINGULAR WIRLEESS II, LLC, GEORGIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CINGULAR WIRELESS II, INC.;REEL/FRAME:017546/0612 Effective date: 20041027 Owner name: CINGULAR WIRELESS II, INC., GEORGIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NEW CINGULAR WIRELESS SERVICES, INC. F/K/A AT&T WIRELESS SERVICES, INC.;REEL/FRAME:017555/0711 Effective date: 20041027 Owner name: CINGULAR WIRLEESS II, LLC, GEORGIA Free format text: CERTIFICATE OF CONVERSION;ASSIGNOR:CINGULAR WIRELESS II, INC.;REEL/FRAME:017546/0612 Effective date: 20041027 Owner name: CINGULAR WIRLEESS II, LLC,GEORGIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CINGULAR WIRELESS II, INC.;REEL/FRAME:017546/0612 Effective date: 20041027 Owner name: CINGULAR WIRELESS II, INC.,GEORGIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NEW CINGULAR WIRELESS SERVICES, INC. F/K/A AT&T WIRELESS SERVICES, INC.;REEL/FRAME:017555/0711 Effective date: 20041027 |
|
AS | Assignment |
Owner name: CINGULAR WIRELESS II, LLC, GEORGIA Free format text: CERTIFICATE OF CONVERSION;ASSIGNOR:CINGULAR WIRELESS II, INC.;REEL/FRAME:017696/0375 Effective date: 20041027 Owner name: CINGULAR WIRELESS II, LLC,GEORGIA Free format text: CERTIFICATE OF CONVERSION;ASSIGNOR:CINGULAR WIRELESS II, INC.;REEL/FRAME:017696/0375 Effective date: 20041027 |
|
AS | Assignment |
Owner name: CINGULAR WIRELESS II, LLC, GEORGIA Free format text: CONVERSION FROM INC TO LLC;ASSIGNOR:CINGULAR WIRELESS II, INC.;REEL/FRAME:020779/0883 Effective date: 20041027 Owner name: NEW CINGULAR WIRELESS SERVICES, INC., GEORGIA Free format text: CHANGE OF NAME;ASSIGNOR:AT&T WIRELESS SERVICES, INC.;REEL/FRAME:020779/0889 Effective date: 20041026 Owner name: AT&T MOBILITY II, LLC, GEORGIA Free format text: CHANGE OF NAME;ASSIGNOR:CINGULAR WIRELESS II, LLC;REEL/FRAME:020779/0971 Effective date: 20070420 Owner name: CINGULAR WIRELESS II, INC., GEORGIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NEW CINGULAR WIRELESS SERVICES, INC.;REEL/FRAME:020777/0070 Effective date: 20041027 Owner name: AT&T MOBILITY II LLC, GEORGIA Free format text: CHANGE OF NAME;ASSIGNOR:AT&T MOBILITY II, LLC;REEL/FRAME:020779/0876 Effective date: 20070823 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: AT&T MOBILITY II, LLC, GEORGIA Free format text: CHANGE OF NAME;ASSIGNOR:CINGULAR WIRELESS II, LLC;REEL/FRAME:021024/0284 Effective date: 20070420 |
|
AS | Assignment |
Owner name: AT&T MOBILITY II LLC, GEORGIA Free format text: CHANGE OF NAME;ASSIGNOR:AT&T MOBILITY II, LLC;REEL/FRAME:021075/0037 Effective date: 20070830 |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Free format text: PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
AS | Assignment |
Owner name: ASHBOURNE TECHNOLOGIES, LLC, DELAWARE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AT&T MOBILITY II LLC;REEL/FRAME:033443/0332 Effective date: 20140610 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
AS | Assignment |
Owner name: OCEANICITY TECHNOLOGIES LLC, DELAWARE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ASHBOURNE TECHNOLOGIES, LLC;REEL/FRAME:046275/0972 Effective date: 20180601 |
|
AS | Assignment |
Owner name: III HOLDINGS 3, LLC, DELAWARE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:OCEANICITY TECHNOLOGIES LLC;REEL/FRAME:046280/0895 Effective date: 20180601 |
|
AS | Assignment |
Owner name: AMERICAN PATENTS LLC, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:III HOLDINGS 3, LLC;REEL/FRAME:046405/0939 Effective date: 20180629 |
|
IPR | Aia trial proceeding filed before the patent and appeal board: inter partes review |
Free format text: TRIAL NO: IPR2019-00482 Opponent name: UNIFIED PATENTS INC. Effective date: 20181227 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20200513 |
|
STCV | Information on status: appeal procedure |
Free format text: APPLICATION INVOLVED IN COURT PROCEEDINGS |
|
IPRC | Trial and appeal board: inter partes review certificate |
Kind code of ref document: K1 Free format text: INTER PARTES REVIEW CERTIFICATE; TRIAL NO. IPR2019-00482, DEC. 27, 2018 INTER PARTES REVIEW CERTIFICATE FOR PATENT 7,373,655, ISSUED MAY 13, 2008, APPL. NO. 09/314,330, MAY 19, 1999 INTER PARTES REVIEW CERTIFICATE ISSUED SEP. 30, 2022 Effective date: 20220930 |